logo

CVE-2024-57439 com.ruoyi:ruoyi

Package

Manager: maven
Name: com.ruoyi:ruoyi
Vulnerable Version: >=0 <=4.8.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00264 pctl0.49647

Details

RuoYi vulnerable to Denial of Service by attackers with admin privileges An issue in the reset password interface of ruoyi v4.8.0 allows attackers with Admin privileges to cause a Denial of Service (DoS) by duplicating the login name of the account.

Metadata

Created: 2025-01-29T15:31:35Z
Modified: 2025-01-29T19:20:35Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/01/GHSA-qq5h-rjj9-q9qg/GHSA-qq5h-rjj9-q9qg.json
CWE IDs: ["CWE-281"]
Alternative ID: GHSA-qq5h-rjj9-q9qg
Finding: F159
Auto approve: 1